Section 2: Attacking the Hardware

In this section, you will get up close and personal with hardware, using off-the-shelf tools and a very cheap, but quite capable, hardware platform (a cheap development board) to analyze and attack in-circuit protocols. You will also become more familiar with common wireless protocols and how to use them to attack hardware devices.

This section comprises the following chapters:

  • Chapter 5, Our Main Attack Platform
  • Chapter 6, Sniffing and Attacking the Most Common Protocols
  • Chapter 7, Extracting and Manipulating Onboard Storage
  • Chapter 8, Attacking Wi-Fi, Bluetooth, and BLE
  • Chapter 9, Software-Defined Radio Attacks
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.90.131.200